Experimental browser for the Atmosphere
"with improving cybersecurity tools and awareness, the cost of persistent, targeted cyber access is rapidly increasing and may, in any event, founder upon encryption...This makes technical security vulnerabilities look increasingly attractive" www.rusi.org/explore-our-...
May 7, 2025, 12:30 PM
{ "uri": "at://did:plc:mj5h6johygkjaoo3dg5q23lm/app.bsky.feed.post/3lolfmzaks22i", "cid": "bafyreicn2ioqe4p6f5bu7irzz6oerkazrvq2bzwzwsupgvnzcw6mp7aocu", "value": { "text": "\"with improving cybersecurity tools and awareness, the cost of persistent, targeted cyber access is rapidly increasing and may, in any event, founder upon encryption...This makes technical security vulnerabilities look increasingly attractive\" www.rusi.org/explore-our-...", "$type": "app.bsky.feed.post", "embed": { "$type": "app.bsky.embed.external", "external": { "uri": "https://www.rusi.org/explore-our-research/publications/commentary/technical-security-back-future", "thumb": { "$type": "blob", "ref": { "$link": "bafkreibs773hicycemy6tv6ip5buylyy2eww3ffjjv3cms7xtqixv6cli4" }, "mimeType": "image/jpeg", "size": 503688 }, "title": "Technical Security: Back to the Future", "description": "Technical security protects against an important range of threat vectors. It has been neglected by both business and government." } }, "langs": [ "en" ], "reply": { "root": { "cid": "bafyreiahkypzexcdupl3fdrelrnl6t3fciobjffb4gbc5ewgqb6c2eplei", "uri": "at://did:plc:mj5h6johygkjaoo3dg5q23lm/app.bsky.feed.post/3lolflo65g22i" }, "parent": { "cid": "bafyreiahkypzexcdupl3fdrelrnl6t3fciobjffb4gbc5ewgqb6c2eplei", "uri": "at://did:plc:mj5h6johygkjaoo3dg5q23lm/app.bsky.feed.post/3lolflo65g22i" } }, "facets": [ { "index": { "byteEnd": 272, "byteStart": 244 }, "features": [ { "uri": "https://www.rusi.org/explore-our-research/publications/commentary/technical-security-back-future", "$type": "app.bsky.richtext.facet#link" } ] } ], "createdAt": "2025-05-07T12:30:28.320Z" } }